A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Target localization in Wireless Sensor Networks using error correcting codes in the presence of Byzantines
2013
2013 IEEE International Conference on Acoustics, Speech and Signal Processing
We consider the problem of target localization using quantized data in Wireless Sensor Networks in the presence of Byzantines (malicious sensors). ...
Since the effect of Byzantines can be treated as errors in the transmitted data, we propose the use of error correcting codes for the task of target localization. ...
TARGET LOCALIZATION USING ERROR CORRECTING CODES In this section, we propose Localization using Error Correcting Codes which is tolerant to Byzantine attacks. ...
doi:10.1109/icassp.2013.6638653
dblp:conf/icassp/VempatyHV13
fatcat:f2c7kzx2hjd45oofu5hmmt5uwa
Target Localization in Wireless Sensor Networks Using Error Correcting Codes
2014
IEEE Transactions on Information Theory
In this work, we consider the task of target localization using quantized data in Wireless Sensor Networks (WSNs). ...
The coding based iterative approach works well even in the presence of Byzantine (malicious) sensors in the network. We further consider the effect of non-ideal channels. ...
In this paper, we considered the problem of target localization in wireless sensor networks. ...
doi:10.1109/tit.2013.2289859
fatcat:4adbyhqsonhkddcp7katx4raii
Secured Routing in Mobile Ad hoc Networks (MANETs)
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
Various attacks are prevalent in MANET, out of which Byzantine attack plays a vital role. ...
A node or group of nodes present in the routing path between the source and the destination may be compromised due to Byzantine attack. ...
The attacker is considered to be strategic in nature and a fusion rule with local sensor thresholds that minimizes the probability of error at the FC is designed. ...
doi:10.32628/cseit195275
fatcat:24jkoix77rgdhbeckkon3x4txi
Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks
2013
IEEE Signal Processing Magazine
In particular, we discuss target localization in a wireless sensor network, where sensors send quantized data to the FC [26] . ...
Vempaty et al. in [27] analyze the effect of Byzantines on target localization. ...
design for networks robust to Byzantines, and fundamental characterizations of communication rate in the presence of Byzantines in the general case ■ ■ development of network-wide capability to detect ...
doi:10.1109/msp.2013.2262116
fatcat:njsqlam5enfh7h73uibptxd6r4
Byzantine fault-tolerant routing for large-scale wireless sensor networks based on fast ECDSA
2015
Tsinghua Science and Technology
Wireless sensor networks are a favorite target of Byzantine malicious attackers because of their limited energy, low calculation capability, and dynamic topology, and other important characteristics. ...
to 1.2 times, we propose a new Byzantine fault-tolerant routing algorithm for large-scale wireless sensor networks with double-level hierarchical architecture. ...
(No. 14ZZ089), Shanghai Key Laboratory of Specialty Fiber Optics and Optical Access Networks (No. ...
doi:10.1109/tst.2015.7350015
fatcat:6ysezir7iffdnetywgqn2zdchy
An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks
[article]
2010
arXiv
pre-print
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. ...
This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. ...
Beyond mere detection of the presence of a network, detection of its structure, topology and other communication pattern among the nodes can invite more directed attacks, e.g., targeted attack on the base ...
arXiv:1012.2516v1
fatcat:z3jly4jjirf7jfsvp4reqaeebi
A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks
[article]
2013
arXiv
pre-print
However, this issue becomes even more critical in cognitive wireless sensor networks, a type of WSN in which the sensor nodes have the capabilities of changing their transmission and reception parameters ...
Since in many WSN applications, lives and livelihoods may depend on the timeliness and correctness of sensor data obtained from dispersed sensor nodes, these networks must be secured to prevent any possible ...
Acknowledgement The author gratefully acknowledges the contributions in this work received from his students Swati Choudhury, Swetashree Mishra, Isha Bharati, Ramesh Kumar, Aiswaraya Mohapatra and Prateek ...
arXiv:1308.0682v1
fatcat:zkwd6kpgkjaojhxkupzpggo67e
An Efficient Security Mechanism for High-Integrity Wireless Sensor Networks
[article]
2012
arXiv
pre-print
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. ...
This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. ...
Beyond mere detection of the presence of a network, detection of its structure, topology and other communication pattern among the nodes can invite more directed attacks, e.g., targeted attack on the base ...
arXiv:1111.0380v2
fatcat:xwtbvyz5erdnhpdaqcdmkwczu4
Table of Contents [EDICS]
2020
IEEE Transactions on Signal Processing
Yang 6142 Joint Features Extraction for Multiple Moving Targets Using (Ultra-)Wideband FMCW Signals in the Presence of Doppler Ambiguity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Guo 6187 Minimum Byzantine Effort for Blinding Distributed Detection in Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Xiong 2912 Prospect Theory Based Crowdsourcing for Classification in the Presence of Spammers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/tsp.2020.3045363
fatcat:wcnvdcy3rvhblh7rtxfe6gz4re
Vulnerabilities in cognitive radio networks: A survey
2013
Computer Communications
Cognitive radio networks are envisioned to drive the next generation wireless networks that can dynamically optimize spectrum use. ...
In this survey, we put forward the security concerns and the vulnerabilities that threaten to plague the deployment of cognitive radio networks. ...
Detection of puea using sensor networks A method to detect the PUEA using an underlying wireless sensor network has been proposed in [15] . ...
doi:10.1016/j.comcom.2013.06.003
fatcat:mqpdzfk67fcv7glayx7vkrdnau
Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks
2017
Journal of Electrical Engineering and Technology
Security is one of main issues in wireless sensor networks because of potential adversaries. ...
This paper provides the different security models as a metric, which can then be used to make pertinent security decisions for securing wireless sensor network communication. ...
Acknowledgements This study was supported by Korea National University of Transportation in 2016 and 2016 Research Grant from Kangwon National University. ...
doi:10.5370/jeet.2017.12.3.1307
fatcat:xjsvruq6una77c3f2fsbmd5o5u
Over-the-Air Computation: Foundations, Technologies, and Applications
[article]
2022
arXiv
pre-print
The mathematical form and communication design are introduced as the foundations of AirComp, and the critical issues of AirComp over different network architectures are then discussed along with the review ...
Moreover, we present the existing studies that tackle the practical implementation issues in AirComp systems, and elaborate the applications of AirComp in Internet of Things and edge intelligent networks ...
from multiple noisy observations in wireless sensor networks. ...
arXiv:2210.10524v1
fatcat:ge26qpdceff4zhbd7fjecaikma
2013 Annual Index
2014
IEEE Transactions on Mobile Computing
-that appeared in this periodical during 2013, and items from previous years that were commented upon or corrected in 2013. ...
The Author Index contains the primary entry for each item, listed under the rst author's name. ...
., +, TMC June 2013 1225-1235 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. ...
doi:10.1109/tmc.2014.1
fatcat:auiwkgw5hraghc33kunuaddexq
Table of Contents
2020
IEEE Transactions on Signal Processing
Bar-Shalom 3371 AOA Pseudolinear Target Motion Analysis in the Presence of Sensor Location Errors .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Sanei 3146 Global Synchronization of Pulse-Coupled Oscillator Networks Under Byzantine Attacks .. . . . . . . . Z. Wang and Y. ...
doi:10.1109/tsp.2020.3042287
fatcat:nh7viihaozhd7li3txtadnx5ui
Securing Multi-Path Routing Using Trust Management in Heterogeneous Wsn
2014
IOSR Journal of Computer Engineering
In this paper we propose a hierarchical dynamic trust management protocol for cluster-based wireless sensor networks. ...
Furthermore, a voting-based IDS algorithm is applied to detect malicious nodes in a heterogeneous wireless sensor network to analyze redundancy level in term of both source and path redundancy. ...
In Wireless Sensor Network mainly it focuses on energy consumption by using clustered sensor nodes. ...
doi:10.9790/0661-16241118
fatcat:z5ah3wiv7fgmbjppbolckq5bly
« Previous
Showing results 1 — 15 out of 241 results